Comparative Analysis of AES-ECC and AES-ECDH Hybrid Models for a Client-Server System

Samiksha Sharma, Anchal Pokharana
{"title":"Comparative Analysis of AES-ECC and AES-ECDH Hybrid Models for a Client-Server System","authors":"Samiksha Sharma, Anchal Pokharana","doi":"10.1109/GCAT52182.2021.9587474","DOIUrl":null,"url":null,"abstract":"Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium for communication between different communities of the world. Communication can be through a wireless media or wired, that requires security of data while transmitting through it because such mediums are susceptible to different external threats, so there’s a strong need of data security for those channels. Cryptography is an art to write code for solving such data threats related problems for communications over an unsecure channel. Cryptography provides diverse set of services to the data such as authentication, privacy, integrity and nonrepudiation through a wide range of techniques. It is broadly classified into two categories named as symmetric and asymmetric cryptography; symmetric technique is fast and uses the same key for encrypting the data and converting the cipher back to its original text using decryption process whereas asymmetric requires different key pair for encrypting and decrypting data. This paper presents a comparative analysis of two hybrid models AES-ECC and AES-ECDH implemented for a client server system. AES is a symmetric technique and is first implemented with ECC for a client server system. After first implementation for further enhancement in the security of data communication between client and server, AES is again implemented with another asymmetric technique ECDH commonly known as a key agreement protocol and a variant of Diffie-Hellman combined with elliptic curve cryptography that adds up more security by establishing a shared secret after a successful key agreement between client and server. After implementing, both the models are analyzed on the basis of various parameters. This paper thus presents the comparison between AES-ECC and AES-ECDH on the basis of various metrics that signify the performance, effectiveness, strength and weakness of an algorithm and also the paper will verify which hybrid technique will be more superior in providing the security and effective delivery of confidential information for a client server communication system.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Global Conference for Advancement in Technology (GCAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCAT52182.2021.9587474","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium for communication between different communities of the world. Communication can be through a wireless media or wired, that requires security of data while transmitting through it because such mediums are susceptible to different external threats, so there’s a strong need of data security for those channels. Cryptography is an art to write code for solving such data threats related problems for communications over an unsecure channel. Cryptography provides diverse set of services to the data such as authentication, privacy, integrity and nonrepudiation through a wide range of techniques. It is broadly classified into two categories named as symmetric and asymmetric cryptography; symmetric technique is fast and uses the same key for encrypting the data and converting the cipher back to its original text using decryption process whereas asymmetric requires different key pair for encrypting and decrypting data. This paper presents a comparative analysis of two hybrid models AES-ECC and AES-ECDH implemented for a client server system. AES is a symmetric technique and is first implemented with ECC for a client server system. After first implementation for further enhancement in the security of data communication between client and server, AES is again implemented with another asymmetric technique ECDH commonly known as a key agreement protocol and a variant of Diffie-Hellman combined with elliptic curve cryptography that adds up more security by establishing a shared secret after a successful key agreement between client and server. After implementing, both the models are analyzed on the basis of various parameters. This paper thus presents the comparison between AES-ECC and AES-ECDH on the basis of various metrics that signify the performance, effectiveness, strength and weakness of an algorithm and also the paper will verify which hybrid technique will be more superior in providing the security and effective delivery of confidential information for a client server communication system.
客户端-服务器系统中AES-ECC和AES-ECDH混合模型的比较分析
数据安全是指保护或保护数据。数据安全是当今世界必不可少的先决条件,因为互联网为世界上不同社区之间的交流提供了媒介。通信可以通过无线媒体或有线媒体进行,这就要求数据在传输时的安全性,因为这些媒体容易受到不同的外部威胁,因此对这些渠道的数据安全性有很强的需求。密码学是一门编写代码以解决此类数据威胁相关问题的艺术,用于通过不安全通道进行通信。密码学通过广泛的技术为数据提供各种服务,如身份验证、隐私、完整性和不可否认性。它大致分为对称密码学和非对称密码学两大类;对称技术速度快,使用相同的密钥对数据进行加密并通过解密过程将密码转换回原始文本,而非对称技术则需要不同的密钥对对数据进行加密和解密。本文对一个客户端服务器系统中实现的AES-ECC和AES-ECDH两种混合模型进行了比较分析。AES是一种对称技术,首先在客户端服务器系统中使用ECC实现。在第一次实现之后,为了进一步增强客户端和服务器之间数据通信的安全性,AES再次实现了另一种非对称技术ECDH,通常被称为密钥协议协议和Diffie-Hellman的变体,结合椭圆曲线加密,通过在客户端和服务器之间成功达成密钥协议后建立共享秘密来增加更多的安全性。在实现后,根据各种参数对两种模型进行了分析。因此,本文在表示算法的性能、有效性、强弱的各种指标的基础上,对AES-ECC和AES-ECDH进行了比较,并将验证哪种混合技术在为客户端服务器通信系统提供机密信息的安全和有效传递方面更优越。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信